CN109587099A - One kind carrying out guard method and device to privacy of user in Video chat - Google Patents

One kind carrying out guard method and device to privacy of user in Video chat Download PDF

Info

Publication number
CN109587099A
CN109587099A CN201710908764.4A CN201710908764A CN109587099A CN 109587099 A CN109587099 A CN 109587099A CN 201710908764 A CN201710908764 A CN 201710908764A CN 109587099 A CN109587099 A CN 109587099A
Authority
CN
China
Prior art keywords
client
user
key
encryption
private key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710908764.4A
Other languages
Chinese (zh)
Inventor
周志刚
陈少杰
张文明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Douyu Network Technology Co Ltd
Original Assignee
Wuhan Douyu Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Douyu Network Technology Co Ltd filed Critical Wuhan Douyu Network Technology Co Ltd
Priority to CN201710908764.4A priority Critical patent/CN109587099A/en
Publication of CN109587099A publication Critical patent/CN109587099A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • H04L51/046Interoperability with other network applications or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/07User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
    • H04L51/10Multimedia information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses one kind to carry out guard method to privacy of user in Video chat, the interaction request for being used to carry out Video chat interaction with the second client sent by receiving the first client;It is then based on the interaction request, encryption is carried out to interactive information using second client corresponding private key and forms encrypted cipher text;Since the private key encryption can only use corresponding public key decryptions, and public key only has the second client just and has, other clients are no, so the encrypted cipher text is finally sent to second client, so that second client is decrypted using public key corresponding with the private key.Since the public key of the second client only has the second client to have, other clients are the public keys without the second client, therefore, even the encrypted cipher text is intercepted by a third party, also it has no idea to decrypt, and then can guarantee the first client and the second client safety that interactive information is transmitted in video interactive.

Description

One kind carrying out guard method and device to privacy of user in Video chat
Technical field
This application involves live video Stream Technology field, more particularly to one kind in Video chat to privacy of user into Row guard method and device.
Background technique
Liked currently, video designs class product has obtained more user, one is especially occupied in young user Fixed market.Video friend-making simultaneously can also design some functions and stranger is allowed to carry out random fit or specific matching Carry out Video chat.
However, Video chat is different from text chat, the people of other side can see, so comparing the social activity of text chat Class product then needs more to focus on the secrecy and safety of user data in safety or privacy of user angle.
Summary of the invention
Invention provides one kind to carry out guard method and device to privacy of user in Video chat, current to solve Video chat the lower technical problem of safety.
Protection side is carried out to privacy of user in Video chat in order to solve the above technical problems, the present invention provides one kind Method, which comprises
Receive the interaction request of the first client transmission being used for and the second client progress Video chat is interactive;
Based on the interaction request, encryption formation is carried out to interactive information using second client corresponding private key and is added Ciphertext;Wherein, the corresponding private key of second client is the non-encrypted algorithm of server by utilizing for second client Private key generate, that second client is exclusive;
The encrypted cipher text is sent to second client, so that second client utilizes and the private key pair The public key answered is decrypted;Wherein, the public key is asymmetric arithmetic described in the server by utilizing for second client That end generates, second client is exclusive and corresponding with private key public key.
Preferably, described that encryption formation encryption is carried out to the interactive information using second client corresponding private key Before ciphertext, the method also includes:
The encryption key that second client is sent is received, and the interactive information is carried out using the encryption key Encryption;Wherein, the encryption key is to belong to the exclusive key of second client.
Preferably, described that encryption formation encryption is carried out to the interactive information using second client corresponding private key Before ciphertext, the method also includes:
The first coding rule that second client is sent is received, and generates encryption private using first coding rule Key, and the interactive information is encrypted using the encryption key that first coding rule generates.
Preferably, described that encryption formation encryption is carried out to the interactive information using second client corresponding private key Before ciphertext, the method also includes:
Encryption key is generated based on the second coding rule, and the encryption key generated using second coding rule is to institute Interactive information is stated to be encrypted;
Second coding rule is sent to second client.
Preferably, it is described using the corresponding private key of second client to interactive information carry out encryption form encrypted cipher text Before, the method also includes:
Determine that first client generates the current time stamp of the interactive information;
The current time stamp is added in interactive information.
Preferably, it is described using the corresponding private key of second client to interactive information carry out encryption form encrypted cipher text Before, the method also includes:
Generate first client for and second client carry out Video chat interact temporary identifier, it is described The unique user identity of temporary identifier and first client proves that mark UID is different;
Mark is proved using the user identity that the temporary identifier replaces first client, and the interaction letter is added In breath.
Preferably, the interactive information includes at least: the title of user, the temporary identifier, the gender of user, user Hobby, the city of user, first client generate the current time stamp of the interactive information.
Another aspect of the present invention discloses one kind and carries out protective device to privacy of user in Video chat, comprising:
Receiving module, for receiving the friendship of the first client transmission being used for and the second client progress Video chat is interactive Mutually request;
Encrypting module, for being based on the interaction request, using the corresponding private key of second client to interactive information It carries out encryption and forms encrypted cipher text;Wherein, the corresponding private key of second client is that the non-encrypted algorithm of server by utilizing is directed to Private key that second client generates, that second client is exclusive;
Sending module, for the encrypted cipher text to be sent to second client, so that second client is sharp It is decrypted with public key corresponding with the private key;Wherein, the public key is asymmetric arithmetic needle described in the server by utilizing Generating to second client, second client is exclusive and corresponding with private key public key.
Preferably, the encrypting module is also used to using the corresponding private key of second client to the interactive information It carries out encryption to be formed before encrypted cipher text, receives the encryption key that second client is sent, and utilize the encryption key The interactive information is encrypted;Wherein, the encryption key is to belong to the exclusive key of second client.
Preferably, the encrypting module is also used to receive the first coding rule that second client is sent, and utilizes First coding rule generates encryption key, and the encryption key generated using first coding rule believes the interaction Breath is encrypted.
Preferably, the encrypting module is also used to be generated encryption key based on the second coding rule, and utilizes described second The encryption key that coding rule generates encrypts the interactive information;
The sending module is also used to second coding rule being sent to second client.
Preferably, described device further include:
Determining module, for determining that first client generates the current time stamp of the interactive information;
First is added module, for the current time stamp to be added in interactive information.
Preferably, described device further include:
Generation module, for generate first client for and second client carry out Video chat interact Temporary identifier, the unique user identity of the temporary identifier and first client prove that mark UID is different;
Second is added module, and the user identity for replacing first client using the temporary identifier proves mark Know, and is added in the interactive information.
Preferably, the interactive information includes at least: the title of user, the temporary identifier, the gender of user, user Hobby, the city of user, first client generate the current time stamp of the interactive information.
Another aspect of the present invention discloses a kind of computer readable storage medium, is stored thereon with computer program, The step in above method technical solution is realized when its program is executed by processor.
Another aspect of the present invention, discloses a kind of computer equipment, including memory, processor and is stored in storage On device and the computer program that can run on a processor, the processor realize the above method technical side when executing described program Step in case.
One or more technical solution through the invention, the invention has the advantages that advantage:
The invention discloses one kind to carry out guard method to privacy of user in Video chat, by receiving the first client The interaction request being used for and the second client progress Video chat is interactive sent;It is then based on the interaction request, utilizes institute State the corresponding private key of the second client to interactive information carry out encryption form encrypted cipher text;Since the private key encryption can only use correspondence Public key decryptions, and public key only has the second client just and has, other clients are no, so finally by the encrypted cipher text It is sent to second client, so that second client is decrypted using public key corresponding with the private key.Due to The public key of second client only has the second client to have, and other clients are the public keys without the second client, therefore, i.e., It is that the encrypted cipher text is intercepted by a third party, also has no idea to decrypt, and then can guarantee the first client and the second client The safety that interactive information is transmitted in video interactive.
Detailed description of the invention
Fig. 1 is the interaction schematic diagram of client and server in the embodiment of the present invention;
Fig. 2 is a kind of flow chart for carrying out guard method to privacy of user in Video chat in the embodiment of the present invention;
Fig. 3 is a kind of schematic diagram for carrying out protective device to privacy of user in Video chat in the embodiment of the present invention.
Specific embodiment
In order to make the application the technical staff in the technical field be more clearly understood that the application, with reference to the accompanying drawing, Technical scheme is described in detail by specific embodiment.
Server of the invention refers to the background server of net cast platform, such as the background server of XX live streaming. Net cast platform is a kind of form of expression of server of the invention.
Client of the invention refers to client corresponding with user, is not to refer in particular to some equipment itself.Even The same equipment, two users are logged on net cast platform respectively using different accounts, then being just referred to as respectively Are as follows: the corresponding client of user 1 and the corresponding client of user 2 are seen as two different clients.And the same use Family is logged on net cast platform respectively using two accounts, is also seen as two clients.That is, to this hair For bright single user, user, account, the relationship of client are: 1 user, N number of account, N client, N are positive integer, That is, 1 user can register with multiple accounts on direct broadcast service platform, each account corresponds to a client. So the targeted user of the first client and the second client of the invention, it may be possible to the same person, it is also possible to be different People.Certainly, for ease of description, the first client and the second client of the invention are corresponding is different user.This In citing in invention, it is to use that it is user A, corresponding the second client (customer end B) that the first client (customer end A) is corresponding Family B.
The main object of the present invention be to two videos make friends user when carrying out information exchange, guarantee interactive information Secrecy and safety.Due to the particularity that video is made friends, so the safety of interactive information is even more important.
Firstly, each user logs on to Video service platform using corresponding client, Video service platform is to answer Exist with the form of program, is a kind of form that server is presented, such as the application program etc. of live streaming class.
Secondly, it is non-right that server can utilize each client for logging on to net cast platform for server Encryption Algorithm is claimed to generate a pair of of public, private key, different clients then generates different public, private keys.Not with symmetric encipherment algorithm Together, rivest, shamir, adelman needs two keys: public-key cryptography (publickey) and private cipher key (privatekey).It is open Key and private cipher key are a pair, if encrypted with public-key cryptography to data, could only be solved with corresponding private cipher key It is close;If encrypted with private cipher key pair data, could only be decrypted with corresponding public-key cryptography.Because of encryption reconciliation It is close to use two different keys, so this algorithm is called rivest, shamir, adelman.In the specific implementation process, when After user logs on to server using client, server can verify the account, only legal registration user's ability Normally log on to Platform Server.After login authentication success, server can then generate a pair of of public, private key, and server leads to public key It crosses network protocol and is sent to the client, private key server is saved itself.For each Account Logon to server, clothes Business device all takes identical strategy.It is implemented as follows:
Public, private key is generated using asymmetric arithmetic RSA herein.
RSA.CreatePairKey(SecretKey,PublicKey);
Use RSA Algorithm next life private key KEY and public key KEY in a pair.
This public, private key is then a pair of of code key, wherein can be with public key come encryption data, with private key come ciphertext data.Service Public key PublicKey can be then sent to the user by device.
When each client logs in, server can then generate respective a pair of of public, private key for each client, then The public key of generation is sent to corresponding client.It for example, is the interaction schematic diagram of client and server referring to Fig. 1. After first client (customer end A) and the second client (customer end B) log in platform, server meeting needle is utilized to customer end A Corresponding a pair of of public key a private key a ' is generated, corresponding public key a is sent to customer end A.Server is for customer end B generation pair Another pair public key b private key b ' answered, is sent to customer end B for corresponding public key b.These two pair public, private key is different.
When user searches video friend-making user by search, the interactive information that server can then make friends a pair of of video, Other side is sent to after encrypting using the private key of other side.For example, the interactive information that customer end A is sent to customer end B makes It is encrypted with the private key b ' of customer end B.Then, encrypted interactive information is sent to customer end B.It is carried out in customer end B When decryption, there is the public key b that can unlock the encrypted interactive information due to there was only customer end B, so this user information exists It when transmitting in network, even if being intercepted by hacker, also has no idea to decrypt, thereby may be ensured that in a pair of of video friend-making information User information is the state of complete encipherment protection, and then guarantees the safety of information transmission.
Lower mask body introduces implementation process of the invention.
Referring to Fig. 2, the invention discloses one kind to carry out guard method, this method packet to privacy of user in Video chat It includes:
Step 11, the interaction for carrying out Video chat interaction with the second client that the first client is sent is received to ask It asks.
In the specific implementation process, it when the interaction request of the embodiment of the present invention can be Video chat and start, is searching The interaction request generated when good friend;It is also possible to after becoming good friend, what when Video chat generated disappears for sending respectively chat The interaction request of breath.
For example, when user A (that is: using the user of the first client) by video friend-making to search good friend when, such as it is logical The pet name or other (such as: user location) are crossed to find matched video good friend user B (that is: using the use of the second client Family) when, the first client can be generated according to the operation of user A for carrying out Video chat interaction with the second client (user B) Interaction request, server then needs that the user information of user A is first sent the past according to the interaction request, and receives good friend The user information of user B, if by mutual consent, so that matched two users can carry out Video chat.
Step 12, it is based on the interaction request, interactive information is added using second client corresponding private key Close formation encrypted cipher text.
In the specific implementation process of the present embodiment, the interactive information that the embodiment of the present invention is mentioned is introduced first.
Interactive information, be the first client be sent to the second client for interaction information, divided according to type, including But it is not limited to: the individual privacy sent when voice-enabled chat information, Video chat information, text chat information, request plusing good friend Information etc..
And the particular content of interactive information, include but is not limited to be: the title of user, user UID (user identity card Bright, User Identification), the gender of user, the hobby of user, user city, generate interactive information it is current when Between stamp, chat content etc..
In these interactive information particular contents, for the UID of user, due to video make friends particularity, for The privacy of user then needs more safeties and anti-harassment.And in video dating site, the UID of a user is then represented The unique identification of one user, be it is fixed, can really indicate the information of the user.For example, first is after forum registers UID23 is obtained, UID23 means that first.That second registration thereafter should be UID24, and UID24 means that second.
For so this UID once acquired in other side, other side has been known that the true UID of the user, then is likely at this After chat terminates, chat is constantly harassed by other side in the case where user is not desired to contact again originally.So the present invention is real It applies in example and the corresponding UID uniquely fixed of client is modified as temporary identifier (interim UID).That is, daily or every Secondary chat server can all regenerate an interim UID to client, and the true UID of the interim UID and user is different, cannot The truth for enough reacting user, is intended only as the mark of substitution, interim UID be it is variable, when each video interactive, service Device can distribute interim UID (certainly, if the second client sends interactive information to send the first client of interactive information When, server also can distribute interim UID for the second client).And then when video is made friends and is matched, user's in interactive information UID is then to be replaced by interim UID, rather than the true UID of user, so that the true UID of user be hidden.And What interim UID then always changed, then specific a certain individual is not corresponded to, and the safety of user is protected with this.
So using the corresponding private key of second client to interactive information carry out encryption formed encrypted cipher text it Before, server can be handled the corresponding interactive information of the first client, in specific treatment process, generate described first Client is used for and second client carries out the temporary identifier of Video chat interaction, the temporary identifier and first visitor The unique user identity in family end proves that mark UID is different;Then the use of first client is replaced using the temporary identifier Family proof of identification mark, and be added in the interactive information.In this way, which user's user identity in interactive information proves mark UID has then been replaced by interim UID.
And for timestamp, the encrypted result of information can be made with more changeability, because of the first client pair The user information answered will not change, and will not change so as to cause the result of encryption, and introduce time variable, then encrypted result is each It will be variation, thus more safe.
So using the corresponding private key of second client to interactive information carry out encryption formed encrypted cipher text it Before, server can determine whether that first client generates the current time stamp of the interactive information;The current time stamp is added Enter in interactive information.
After introduction finishes interactive information, the present invention believes the interaction in the corresponding private key of the first client of server by utilizing Before breath is encrypted, the first client can upload the interactive information to server, report interactive information to the mistake of server Cheng Zhong, the first client are to be encrypted using corresponding public key, and then server is after receiving the interactive information, It is to be decrypted using the corresponding private key of the first client.For example, when customer end A updates or report of user is personal When information is to server, such as the location information or other information that report oneself, to server, customer end A then will use client The corresponding public key of A is come to server is re-send to after information encryption, so only server just has the corresponding private key solution of customer end A Close information out, to ensure safety of the information in network transmission process.
And during server for encrypting, will use the corresponding private key of the second client encrypts interactive information, So being merely able to that interactive information is decrypted using the corresponding public key of the second client, even by hacker institute in decryption Interception, also has no idea to decrypt, thereby may be ensured that the safety of the user information in a pair of of video friend-making information.
The corresponding private key of second client is that the non-encrypted algorithm of server by utilizing is generated for second client , the private key that second client is exclusive.That is, the corresponding private key of the second client is that the second client is exclusive, Other clients do not have, so even being that other clients have obtained the encrypted cipher text, can not decrypt, to guarantee interactive letter Cease the safety of transmission.
As a kind of optional embodiment, in order to further ensure the safety of encryption, can using private key encryption it Before, first interactive information is encrypted.In the specific implementation process, server receives the encryption that second client is sent Key, and the interactive information is encrypted using the encryption key.Wherein, the encryption key is to belong to described second The exclusive key of client.Specifically, encryption key is to be sent to server by the second client.So server exists When sending interactive information, without retransmiting encryption key to the second client, the second client can call directly local add It is decrypted close key pair, can be avoided transmission encryption key, and then reduce and be intercepted by a third party the risk usurped, further Guarantee the safety of information transmission.Also, have since encryption key only has the second client and server, even if so encrypting it Interactive information afterwards is obtained by other client, is also had no idea to decrypt, be thereby may be ensured that in a pair of of video friend-making information User information safety.
As a kind of optional embodiment, the second client can not directly transmit encryption key, and only send coding The coding rule of encryption key is to server.Specifically, in the corresponding private key of utilization second client to interactive information It carries out encryption to be formed before encrypted cipher text, receives the first coding rule that second client is sent, and utilize described first Coding rule generates encryption key, and is added using the encryption key that first coding rule generates to the interactive information It is close.The advantage of doing so is that: firstly, the first coding rule is to be sent to server by the second client.So server exists When sending interactive information, without retransmiting encryption key to the second client, the second client can call directly local the One coding rule generates encryption key and it is decrypted, and can be avoided the first coding rule of transmission, and then reduce by third party The risk usurped is intercepted, is further ensured that the safety of information transmission.Secondly as the first coding rule only have the second client and Server just has, even if also having no idea to decrypt so the interactive information after encryption is obtained by other client, so as to To guarantee the safety of the user information in a pair of of video friend-making information.
As a kind of optional embodiment, the interactive information is being carried out using second client corresponding private key Encryption is formed before encrypted cipher text, and server is also based on the second coding rule and generates encryption key, and utilizes described second The encryption key that coding rule generates encrypts the interactive information;Second coding rule is sent to described second Client.Second coding rule is that the coding rule that server is determined is used to encrypt interactive information.So transmitting Encrypted interactive information is given after the second client, can also transmit the second coding rule to the second client, so that the second visitor Family end can generate corresponding decruption key according to the second coding rule and encrypted interactive information is decrypted.Therefore, even if It is that other clients have got encrypted interactive information, not obtaining the second coding rule is also that can not decrypt to it, And then it can be further ensured that the safety of information transmission.
After encryption is completed, then next step can be carried out.
Step 13, the encrypted cipher text is sent to second client, so that second client utilizes and institute The corresponding public key of private key is stated to be decrypted.
And during decryption, firstly, the public key that the embodiment of the present invention is mentioned, is non-right described in the server by utilizing Claiming that algorithm generates for second client, second client is exclusive and corresponding with private key public key.
Secondly, being be directed to the generation of the second client using server one during the second client is decrypted Public key in private-public key is decrypted, since the private-public key is a pair of, and is that the second client is exclusive, so only There is the second client that the encrypted cipher text can be decrypted.
Since the first client and the second client are actually the process of information exchange, so the second client can also be with The first client is sent messages to, is then decrypted by the first client.In the process, the second client is sending message It when to the first client, is sent after being encrypted by the public key of the second client, the second client of server by utilizing Message is decrypted in corresponding private key.Thereafter, the corresponding private key of the first client of server by utilizing encrypts the message, It is then forwarded to the first client, and then it is right to can use itself after receiving the message after the encryption for the first client It is decrypted in the public key answered.
As an example it is assumed that user A (using customer end A) and user B (using customer end B) are matched, first to be regarded Frequency is chatted, then both sides require to receive the user information of other side.
Firstly, user information is packaged.In video friend-making, both sides is needed to intercourse user information.Specifically User information includes, the title of user, the interim UID of user, the gender of user, the hobby of user, user city, it is current when Between stab etc. information be packaged together.
Secondly, being encrypted together to user information Introduction Time stamp.
In the process of encryption:
Introduction Time stamp of the present invention can then make the encrypted result of information with more changeability, because user information will not Variation, will not change so as to cause the result of encryption, and introduce time variable, then encrypted result can be variation every time, from And it is more safe.
It is directed to citing of the invention, user A and user B carry out Video chat.Customer end A is needed the user of user A Information is sent to customer end B, and customer end B needs the user information by user B to be sent to customer end A.
When the user information of user A is sent to customer end B by customer end A, the private key that server then will use customer end B adds The user information of close user A, and encrypted user information is sent to customer end B, so that only customer end B just can be carried out solution It is close.
And customer end B is when being sent to customer end A for the user information of user B, then server then will use customer end A The user information of private key encryption user B, and the user information of encryption is sent to customer end A, so that only customer end A could be into Row decryption.
It is implemented as follows:
For the ciphering process of the user information of user A:
EncryptUserInfoA=RSA.Encrypt (UserInfoA+Time, BSecretKey);
It is then the user information UserInfoA of user A herein, in addition timestamp information Time, then using customer end B SecretKey encrypts information.Customer end B is then sent to after encryption.
Similarly for the ciphering process of the user information of B:
EncryptUserInfoB=RSA.Encrypt (UserInfoB+Time, ASecretKey);
It is then the user information UserInfoB of user B herein, in addition timestamp information Time, then using customer end A SecretKey encrypts information.Customer end A is then sent to after encryption.
Since public key is different for each client, and private key only has server to have, so personal user information In a network transmission be safe, and being trapped without corresponding private key KEY decryption then can not also crack it is therein Cleartext information.
So far, it is achieved that after being encrypted for user information using the private key of reciever and is sent to other side's use mutually Family.
And during decryption:
When user, which is matched to corresponding user, carries out Video chat, then it will receive the user information that server issues, it is first First user can then be decrypted information, to obtain the cleartext information of the other user.It is implemented as follows:
For user when logging in, server is then handed down to one public key KEY of client.
Assuming that customer end A receives the user information of user B.
UserInfoB=RSA.Decrypt (EncryptUserInfoB, APublicKeyKey);
So customer end A user information that the user B of encryption is then decrypted with the public key APublicKeyKey of oneself, from And obtain the user information of the user B of plaintext.
So far, it is achieved that the operation that the user information for the other side that server issues is decrypted user.
Based on unified inventive concept, the invention also discloses one kind to carry out protection dress to privacy of user in Video chat It sets.
Referring to Fig. 3, the inventive system comprises:
Receiving module 31, for receiving being used for and the progress Video chat interaction of the second client for the first client transmission Interaction request;
Encrypting module 32 believes interaction using the corresponding private key of second client for being based on the interaction request Breath carries out encryption and forms encrypted cipher text;Wherein, the corresponding private key of second client is the non-encrypted algorithm needle of server by utilizing Second client is generated, private key that second client is exclusive;
Sending module 33, for the encrypted cipher text to be sent to second client, so that second client It is decrypted using public key corresponding with the private key;Wherein, the public key is asymmetric arithmetic described in the server by utilizing Generating for second client, second client is exclusive and corresponding with private key public key.
Preferably, the encrypting module 32 is also used to believe the interaction using the corresponding private key of second client Breath carries out encryption and is formed before encrypted cipher text, receives the encryption key that second client is sent, and close using the encryption Key encrypts the interactive information;Wherein, the encryption key is to belong to the exclusive key of second client.
Preferably, the encrypting module 32 is also used to receive the first coding rule that second client is sent, and benefit Encryption key is generated with first coding rule, and the encryption key generated using first coding rule is to the interaction Information is encrypted.
Preferably, the encrypting module 32 is also used to be generated encryption key based on the second coding rule, and utilizes described the The encryption key that two coding rules generate encrypts the interactive information;
The sending module is also used to second coding rule being sent to second client.
Preferably, described device further include:
Determining module, for determining that first client generates the current time stamp of the interactive information;
First is added module, for the current time stamp to be added in interactive information.
Preferably, described device further include:
Generation module, for generate first client for and second client carry out Video chat interact Temporary identifier, the unique user identity of the temporary identifier and first client prove that mark UID is different;
Second is added module, and the user identity for replacing first client using the temporary identifier proves mark Know, and is added in the interactive information.
Preferably, the interactive information includes at least: the title of user, the temporary identifier, the gender of user, user Hobby, the city of user, first client generate the current time stamp of the interactive information.
Based on inventive concept same in previous embodiment, the present invention also provides a kind of computer readable storage medium, The step of being stored thereon with computer program, any the method above realized when which is executed by processor.
Based on inventive concept same in previous embodiment, the present invention also provides a kind of computer equipment, including storage Device, processor and storage on a memory and the computer program that can run on a processor, the processor execution journey The step of any the method above is realized when sequence.
One or more embodiment through the invention, the invention has the advantages that advantage:
The invention discloses one kind to carry out guard method to privacy of user in Video chat, by receiving the first client The interaction request being used for and the second client progress Video chat is interactive sent;It is then based on the interaction request, utilizes institute State the corresponding private key of the second client to interactive information carry out encryption form encrypted cipher text;Since the private key encryption can only use correspondence Public key decryptions, and public key only has the second client just and has, other clients are no, so finally by the encrypted cipher text It is sent to second client, so that second client is decrypted using public key corresponding with the private key.Due to The public key of second client only has the second client to have, and other clients are the public keys without the second client, therefore, i.e., It is that the encrypted cipher text is intercepted by a third party, also has no idea to decrypt, and then can guarantee the first client and the second client The safety that interactive information is transmitted in video interactive.
Although the preferred embodiment of the application has been described, but one of ordinary skilled in the art once knows substantially Creative concept, then additional changes and modifications may be made to these embodiments.It is wrapped so the following claims are intended to be interpreted as It includes preferred embodiment and falls into all change and modification of the application range.
Obviously, those skilled in the art can carry out various modification and variations without departing from the essence of the application to the application Mind and range.In this way, if these modifications and variations of the application belong to the range of the claim of this application and its equivalent technologies Within, then the application is also intended to include these modifications and variations.

Claims (10)

1. one kind carries out guard method to privacy of user in Video chat, which is characterized in that the described method includes:
Receive the interaction request of the first client transmission being used for and the second client progress Video chat is interactive;
Based on the interaction request, it is close that encryption formation encryption is carried out to interactive information using second client corresponding private key Text;Wherein, the corresponding private key of second client is that the non-encrypted algorithm of server by utilizing is generated for second client , the private key that second client is exclusive;
The encrypted cipher text is sent to second client, so that second client is using corresponding with the private key Public key is decrypted;Wherein, the public key is that asymmetric arithmetic described in the server by utilizing is raw for second client At, second client is exclusive and corresponding with private key public key.
2. the method as described in claim 1, which is characterized in that described to utilize the corresponding private key of second client to described Interactive information carries out encryption and is formed before encrypted cipher text, the method also includes:
The encryption key that second client is sent is received, and the interactive information is added using the encryption key It is close;Wherein, the encryption key is to belong to the exclusive key of second client.
3. the method as described in claim 1, which is characterized in that described to utilize the corresponding private key of second client to described Interactive information carries out encryption and is formed before encrypted cipher text, the method also includes:
The first coding rule that second client is sent is received, and generates encryption key using first coding rule, And the interactive information is encrypted using the encryption key that first coding rule generates.
4. the method as described in claim 1, which is characterized in that described to utilize the corresponding private key of second client to described Interactive information carries out encryption and is formed before encrypted cipher text, the method also includes:
Encryption key is generated based on the second coding rule, and the encryption key generated using second coding rule is to the friendship Mutual information is encrypted;
Second coding rule is sent to second client.
5. the method as described in claim 1, which is characterized in that described to utilize the corresponding private key of second client to interaction Information carries out encryption and is formed before encrypted cipher text, the method also includes:
Determine that first client generates the current time stamp of the interactive information;
The current time stamp is added in interactive information.
6. method as claimed in claim 6, which is characterized in that described to utilize the corresponding private key of second client to interaction Information carries out encryption and is formed before encrypted cipher text, the method also includes:
Generate first client for and second client carry out Video chat interaction temporary identifier, it is described temporarily Mark proves that mark UID is different with the unique user identity of first client;
Mark is proved using the user identity that the temporary identifier replaces first client, and the interactive information is added In.
7. method as claimed in claim 6, which is characterized in that the interactive information includes at least: the title of user described is faced When mark, the gender of user, the hobby of user, the city of user, first client generate the current of the interactive information Timestamp.
8. one kind carries out protective device to privacy of user in Video chat characterized by comprising
Receiving module, the interaction for carrying out Video chat interaction with the second client for receiving the transmission of the first client are asked It asks;
Encrypting module carries out interactive information using the corresponding private key of second client for being based on the interaction request Encryption forms encrypted cipher text;Wherein, the corresponding private key of second client is the non-encrypted algorithm of server by utilizing for described Private key that second client generates, that second client is exclusive;
Sending module, for the encrypted cipher text to be sent to second client so that second client utilize and The corresponding public key of the private key is decrypted;Wherein, the public key is asymmetric arithmetic described in the server by utilizing for institute State the generation of the second client, second client is exclusive and corresponding with private key public key.
9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is held by processor The step of any one of claim 1-7 the method is realized when row.
10. a kind of computer equipment including memory, processor and stores the meter that can be run on a memory and on a processor Calculation machine program, which is characterized in that the processor realizes the step of any one of claim 1-7 the method when executing described program Suddenly.
CN201710908764.4A 2017-09-29 2017-09-29 One kind carrying out guard method and device to privacy of user in Video chat Pending CN109587099A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710908764.4A CN109587099A (en) 2017-09-29 2017-09-29 One kind carrying out guard method and device to privacy of user in Video chat

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710908764.4A CN109587099A (en) 2017-09-29 2017-09-29 One kind carrying out guard method and device to privacy of user in Video chat

Publications (1)

Publication Number Publication Date
CN109587099A true CN109587099A (en) 2019-04-05

Family

ID=65914352

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710908764.4A Pending CN109587099A (en) 2017-09-29 2017-09-29 One kind carrying out guard method and device to privacy of user in Video chat

Country Status (1)

Country Link
CN (1) CN109587099A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113285870A (en) * 2021-06-09 2021-08-20 成都安恒信息技术有限公司 Method and system for protecting internet chat privacy
CN116112458A (en) * 2023-02-09 2023-05-12 网易(杭州)网络有限公司 Communication method, device, equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1859081A (en) * 2006-02-17 2006-11-08 华为技术有限公司 Immediate news enciphering transmission method and system
US20080118070A1 (en) * 2006-11-20 2008-05-22 6580874 Canada Inc. Open and distributed systems to provide secure email service
CN104954378A (en) * 2015-06-19 2015-09-30 收付宝科技有限公司 Asymmetric message encryption method and system
CN104980428A (en) * 2015-04-28 2015-10-14 腾讯科技(深圳)有限公司 Network communication method, device and system
CN105763571A (en) * 2016-04-27 2016-07-13 蓝盾信息安全技术有限公司 SIP-based asymmetric voice encryption

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1859081A (en) * 2006-02-17 2006-11-08 华为技术有限公司 Immediate news enciphering transmission method and system
US20080118070A1 (en) * 2006-11-20 2008-05-22 6580874 Canada Inc. Open and distributed systems to provide secure email service
CN104980428A (en) * 2015-04-28 2015-10-14 腾讯科技(深圳)有限公司 Network communication method, device and system
CN104954378A (en) * 2015-06-19 2015-09-30 收付宝科技有限公司 Asymmetric message encryption method and system
CN105763571A (en) * 2016-04-27 2016-07-13 蓝盾信息安全技术有限公司 SIP-based asymmetric voice encryption

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113285870A (en) * 2021-06-09 2021-08-20 成都安恒信息技术有限公司 Method and system for protecting internet chat privacy
CN116112458A (en) * 2023-02-09 2023-05-12 网易(杭州)网络有限公司 Communication method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
Zhang et al. Efficient and flexible password authenticated key agreement for voice over internet protocol session initiation protocol using smart card
CN106357396B (en) Digital signature method and system and quantum key card
CN107483505A (en) The method and system that a kind of privacy of user in Video chat is protected
CN105871869B (en) Hash function and false identity anonymous bidirectional authentication method are based in mobile social networking
CN104754581B (en) A kind of safety certifying method of the LTE wireless networks based on public-key cryptosystem
CN102547688B (en) Virtual-dedicated-channel-based establishment method for high-credibility mobile security communication channel
Chaudhry et al. A multiserver biometric authentication scheme for tmis using elliptic curve cryptography
CN111404664B (en) Quantum secret communication identity authentication system and method based on secret sharing and multiple mobile devices
JP2015537483A (en) Drawing management system and drawing management method by fingerprint authentication
CN109951513A (en) Anti- quantum calculation wired home quantum cloud storage method and system based on quantum key card
CN108809636A (en) The communication system and communication means of message authentication between member are realized based on group's type quantum key card
CN111416712B (en) Quantum secret communication identity authentication system and method based on multiple mobile devices
CN105553979A (en) Encryption publishing method for privacy information in smart power grid
Wang et al. One-round privacy-preserving meeting location determination for smartphone applications
CN103368918A (en) Method, device and system for dynamic password authentication
CN109889329A (en) Anti- quantum calculation wired home quantum communications method and system based on quantum key card
CN109587099A (en) One kind carrying out guard method and device to privacy of user in Video chat
Abbas et al. PRISM: PRivacy-aware interest sharing and matching in mobile social networks
Sandoval et al. Pakemail: authentication and key management in decentralized secure email and messaging via pake
CN111526131B (en) Anti-quantum-computation electronic official document transmission method and system based on secret sharing and quantum communication service station
CN113014376B (en) Method for safety authentication between user and server
Go et al. Wireless authentication protocol preserving user anonymity
Chiou et al. Mobile common friends discovery with friendship ownership and replay-attack resistance
Madhusudhan et al. An efficient and secure user authentication scheme with anonymity in global mobility networks
Wang et al. Secure content sharing protocol for D2D users based on profile matching in social networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190405

RJ01 Rejection of invention patent application after publication